Intel CET In Action
In this article, we’ll examine how effective CET is at mitigating real-world exploits that make use of ROP or stack based buffer overflow vulnerabilities.
Read MoreIn this article, we’ll examine how effective CET is at mitigating real-world exploits that make use of ROP or stack based buffer overflow vulnerabilities.
Read MoreIn this blog post Offensive Security will explain why you should take the time to understand and learn about your tools before you run them.
Read MoreWe’re spilling the details! Find out what’s new and what’s coming with this monthly recap of what’s happening at Offensive Security.
Read MoreLearn how the fundamental skills taught in Penetration Testing with Kali Linux (PWK) are applicable beyond a career in pentesting.
Read MoreOSCP holder J3rryBl4nks shares his thoughts on Offensive Security’s Evasion Techniques and Breaching Defenses course.
Read MoreGet official answers to the most common questions about OffSec’s new Windows User Mode Exploit Development course and the OSED exam.
Read MoreWhat do you need to know before taking Evasion Techniques and Breaching Defenses (PEN-300)? Nullg0re gives us his review on the new course.
Read MoreTake a look back at 2020’s course launches and updates, and learn what to expect in 2021 with this year-end recap from Offensive Security.
Read MoreLearn how Packetlabs used Offensive Security’s Proving Grounds solution to identify and hire top penetration testing talent.
Read MoreOSCP holder Rana Khalil shares her journey to becoming a cybersecurity analyst and her thoughts on what it takes to succeed.
Read MoreSecurity researchers at Offensive Security discovered a vulnerability in the XPC service of Microsoft Teams. Here’s how it works and how to secure it.
Read MoreGet official answers to the most common questions about OffSec’s new Evasion Techniques and Breaching Defenses course and the OSEP exam.
Read MoreLearn about OffSec’s new Evasion Techniques and Breaching Defenses course (PEN-300) and OSEP certification. This course is one of the replacements for CTP.
Read MoreAs part of our ongoing efforts to support student success, we’re introducing a new learning path for the PWK labs. Find out more – along with pass rate data.
Read MoreBuild your own home lab with this extensive guide from TJnull. He covers the why and how, offers points of consideration, and shares his top resources.
Read MoreIn this post, Dejan walks us through an authentication bypass vulnerability discovered in Wekan and reported by Offensive Security.
Read More